联系方式

  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-23:00
  • 微信:codinghelp

您当前位置:首页 >> Python编程Python编程

日期:2020-08-08 10:54

Assessment Information

SIT716: COMPUTER NETWORKS AND SECURITY

Assessment 1b: Bi-weekly Report (Weeks 3-4)

KEY INFORMATION

Due: Sunday August 9th by 11:59pm

Weight: 6% of total mark for this unit

Word limit: 1 to 2 pages

Individual Assessment

PURPOSE

Short answer questions to assess and reinforce learning of the concepts of Weeks 3-4 by

exploring convergence of dynamic routing protocols and possible cyber-attacks on the TCP

disconnection exchange.

TASK(S)

Dynamic routing protocols such as OSPF are a key technology in the reliable operation of

networks in most large organisations. To ensure correct information is communicated,

installations of OSPF are usually configured to include a hash value in OSPF packets to allow

their contents to be validated by receivers.

Consider a scenario where an attacker gains limited control over a router which interconnects

three or more networks. The access gained by the attacker only allows them to activate or

deactivate (turn on or off) any of the network interfaces on that router.

i. Describe how OSPF would react to the attacker deactivating one of the network

interfaces on the router.

ii. Discuss the possible impacts on the network if the attacker were to repeatedly

deactivate and reactivate one of the network interfaces on the router.

Assessment Information

SUBMISSION DETAILS

Your answers should be submitted via CloudDeakin to the TurnItIn-enabled Assignment Folder

for the Assignment 1b - Weeks 3-4 Bi-Weekly Report. Your answers to each question and subquestion

must be clearly identified in your submission. Acceptable file formats are Word

documents, PowerPoint documents, PDF documents, text and rich text files, and HTML.

Compressed files, such as ZIP files or RAR files are not accepted and will not be marked.

After submitting your assignment you should receive an email to your Deakin email address

confirming that it has been submitted. You should check that you can see your assignment in

the Submissions view of the Assignment folder after upload, and check for, and keep, the email

receipt for the submission.

ACADEMIC MISCONDUCT

Academic misconduct and plagiarism is subjected to penalties.

Plagiarism includes and not limited to:

? Copying others’ work without appropriate referencing

? Re-using assignment material completed by other students

? Contracting others to do assessment tasks on your behalf.

https://www.deakin.edu.au/students/study-support/referencing/academic-integrity

LEARNING OUTCOMES

This assignment assesses the following Graduate Learning Outcomes (GLO) and related Unit

Learning Outcomes (ULO):

Graduate Learning Outcome (GLO) Unit Learning Outcome (ULO)

GLO1: You will be required to work with

content relevant to computer networks,

network security, and the IT discipline in

general.

ULO1: You will be required to explain the

architecture and operation of computer

networks, security attacks, and defensive

measures.

ULO2: You will be required to explain

normal and abnormal behaviour of

network protocols.

ULO3: You will be required to explain

how cybersecurity activity can be

identified.

Assessment Information

EXTENSIONS

No extensions will be considered for this assessment unless a request is submitted through the

CloudDeakin and approved by the Unit Chair (enter SIT716 unit page and click Assessment ->

Extension request). Assignment Extensions are normally only approved when students apply

before the due date. The Unit Chair may ask you to supply supporting documentation about the

difficulties you are facing, and evidence of the work you have completed so far.

A marking penalty will be applied where the assessment task is submitted after the due date

without an approved extension as follows:

a. 5% will be deducted from available marks for each day up to five days

b. where work is submitted more than five days after the due date, the task will not be

marked and the student will receive 0% for the task.

'Day' means working day for paper submissions and calendar day for electronic submissions.

(This assessment task uses electronic submission)

Assessment Information

SIT716 Computer Networks and Security

Assessment 1: Bi-Weekly Report (Course 2)

Criteria High Distinction

(80 – 100)

Distinction

(70 – 79)

Credit

(60 – 69)

Pass

(50 – 59)

Fail

(0 – 49)

Task i

Criteria 1:

50%

Discuss OSPF’s reaction to a

link being deactivated.

How OSPF would react to a

link being deactivated has

been clearly explained and

you have clearly

demonstrated insight into

the potential impacts on

network connectivity

generally and how that

would be influenced by

different possible changes

to network topology.

How OSPF would react to a

link being deactivated has

been clearly explained and

there is good insight into the

impact on the network

connectivity more generally.

How OSPF would react to a

link being deactivated has

been adequately explained.

Description of how OSPF

would react to a link being

deactivated is unclear and/or

there are minor gaps in the

answer.

Answer does not correctly

explain how OSPF will react

to the state of a link being

deactivated.

Task ii

Criteria 2:

50%

Discuss OSPF’s reaction to

the state of a link rapidly

being deactivated and

reactivated.

How OSPF would react to a

link being rapidly

deactivated/reactivated has

been clearly explained and

there is good insight into

the potential impacts on

network connectivity and

how that would be

influenced by different

possible changes to

network topology.

How OSPF would react to a

link being rapidly

deactivated/reactivated has

been clearly explained and

there is good insight into the

impact on the network

connectivity more generally.

How OSPF would react to a

link being rapidly

deactivated/reactivated has

been adequately explained.

Description of how OSPF

would react to a link being

rapidly deactivated/

reactivated is unclear and/or

there are minor gaps in the

answer.

Answer does not correctly

explain how OSPF will react

to the state of a link being

rapidly deactivated/

reactivated.


版权所有:留学生编程辅导网 2020 All Rights Reserved 联系方式:QQ:99515681 微信:codinghelp 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。 站长地图

python代写
微信客服:codinghelp